Answer: data
Explanation:
Data refers to symbols or numbers that aren't meaningful. It's an an individual unit which consists of raw materials. Data hato be interpreted in order to become meaningful. They are fact or figures. Examples of data include 24, London, 144 etc.
Information on the other hand is a data that has been processed. e.g. Bob has an aggregate score of 144. Based on the question given, the number 144 is a data as it isn't meaningful yet.
Resource allocation is a function performed by control programs that manages computer resources, such as storage and memory. It is necessary for any application to be run on the system because the computer is required to allocate certain resources for it to be able to run once the user opens any program.
Answer: B) Character
Explanation:
According to the question, character of Greg is depicted through the scenario as he is displaying his moral quality ,honesty and mind integrity through not providing low-quality product to his customers even though he has chance to save company money through buying shape material .
Thus, he has good character to provide quality product and maintaining reputation and company as well as valuing his customers.
Other options are incorrect because fairness, community, expertise and competence are not the quality trait depicted through question's scenario. Thus, the correct option is option(B).
If a router tried to match a packet sourced from IP address 1.1.1.1 using this ACL, the first statement will be used.
a. First
<u>Explanation:</u>
We use ACL technology to make basic security level in the network. ACL is strictly used to update the routing in the network and make sure network pears and make sure the flow control for network traffic is followed.
Since it is routing ip address through ACL statement. It all depends on how the network engineer routed the traffic in the network. A packet with source IP address 1.1.1.1 would match any of the three explicitly configured commands described in the question. As a result, the first statement will be used.
The router searches the ACL statement by order and when the match is found it stops execution of the ACL statement that will match with the first occurrence.